Home // ICDS 2013, The Seventh International Conference on Digital Society // View article
Security Assurance Requirements for Hypervisor Deployment Features
Authors:
Ramaswamy Chandramouli
Keywords: Virtual Machine; Virtual Network; Hypervisor; Virtualized Host; Security Assurance Requirements
Abstract:
Virtualized hosts provide abstraction of the hardware resources (i.e., CPU, Memory, etc.) enabling multiple computing stacks to be run on a single physical machine. The Hypervisor is the core software that enables this virtualization and hence must be configured to ensure security robustness for the entire virtualization infrastructure. Among the various combination of hypervisor types and hypervisor hardware platforms, we have chosen a reference architecture as the basis for our set of deployment features. For each deployment feature, this paper looks at the configuration options and analyzes the security implications of the options/deployment feature to derive a set of assurance requirements that are either (a) provided by each of the configuration options; or (b) required for that deployment feature as a whole regardless of configuration options.
Pages: 120 to 125
Copyright: Copyright (c) The Government of USA, 2013. Used by permission to IARIA.
Publication date: February 24, 2013
Published in: conference
ISSN: 2308-3956
ISBN: 978-1-61208-249-3
Location: Nice, France
Dates: from February 24, 2013 to March 1, 2013